From: Antoine Coeur <co...@gmx.fr>

Fix various typos in documentation, comments and debug strings.

Cc: Jiewen Yao <jiewen....@intel.com>
Cc: Jian J Wang <jian.j.w...@intel.com>
Cc: Chao Zhang <chao.b.zh...@intel.com>
Signed-off-by: Antoine Coeur <co...@gmx.fr>
Reviewed-by: Philippe Mathieu-Daude <phi...@redhat.com>
Reviewed-by: Jiewen Yao <jiewen....@intel.com>
Signed-off-by: Philippe Mathieu-Daude <phi...@redhat.com>
---
 SecurityPkg/Tcg/TcgSmm/TcgSmm.inf                      |  2 +-
 SecurityPkg/Include/Library/TcgStorageCoreLib.h        |  4 ++--
 SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h            |  6 +++---
 SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c |  2 +-
 SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c |  2 +-
 SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c        | 10 +++++-----
 SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c         |  2 +-
 SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c            |  8 ++++----
 .../Tcg/PhysicalPresencePei/PhysicalPresencePei.c      |  2 +-
 SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c            |  2 +-
 SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c                      |  4 ++--
 SecurityPkg/Tcg/TcgPei/TcgPei.c                        |  8 ++++----
 SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni                    |  2 +-
 SecurityPkg/Tcg/TcgSmm/TcgSmm.uni                      |  2 +-
 14 files changed, 28 insertions(+), 28 deletions(-)

diff --git a/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf 
b/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf
index 40827041cae4..29f9c15b0e02 100644
--- a/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf
+++ b/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf
@@ -1,5 +1,5 @@
 ## @file
-#  Implements ACPI metholds for the TCG feature
+#  Implements ACPI methods for the TCG feature
 #
 #  This driver implements TPM definition block in ACPI table and registers SMI
 #  callback functions for physical presence and MemoryClear to handle the 
requests
diff --git a/SecurityPkg/Include/Library/TcgStorageCoreLib.h 
b/SecurityPkg/Include/Library/TcgStorageCoreLib.h
index c25a56a14ca2..01a44c667c80 100644
--- a/SecurityPkg/Include/Library/TcgStorageCoreLib.h
+++ b/SecurityPkg/Include/Library/TcgStorageCoreLib.h
@@ -588,7 +588,7 @@ TcgAddEndTransaction(
   );
 
 /**
-  Initial the tcg parse stucture.
+  Initial the tcg parse structure.
 
   @param    ParseStruct    Input parse structure.
   @param    Buffer         Input buffer data.
@@ -1218,7 +1218,7 @@ TcgParseSyncSession(
   @param     HostSession       Host session data.
   @param     AceRow            Ace row info.
   @param     Authority1        Authority 1 info.
-  @param     LogicalOperator   Logiccal operator info.
+  @param     LogicalOperator   Logical operator info.
   @param     Authority2        Authority 2 info.
 
   @retval    Return the action result.
diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h 
b/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h
index 0543a2ce493d..557c1f8d68da 100644
--- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h
+++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h
@@ -247,7 +247,7 @@ GetDiskNameStringId(
 
   @param OpalDisk                The Opal device.
 
-  @retval EFI_SUCCESS             Initialize the device success.
+  @retval EFI_SUCCESS            Initialize the device success.
   @retval EFI_DEVICE_ERROR       Get info from device failed.
   @retval EFI_INVALID_PARAMETER  Not get Msid info before get ownership info.
 
@@ -348,7 +348,7 @@ HiiUninstall(
 
   @param Dev                  The Opal device.
 
-  @retval EFI_SUCCESS          Initialize the device success.
+  @retval EFI_SUCCESS         Initialize the device success.
   @retval EFI_DEVICE_ERROR    Get info from device failed.
 
 **/
@@ -362,7 +362,7 @@ OpalDiskInitialize (
 
   @param OpalDisk                The Opal device.
 
-  @retval EFI_SUCCESS             Get ownership success.
+  @retval EFI_SUCCESS            Get ownership success.
   @retval EFI_ACCESS_DENIED      Has send BlockSID command, can't change 
ownership.
   @retval EFI_INVALID_PARAMETER  Not get Msid info before get ownership info.
 
diff --git a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c 
b/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c
index f9c57a13f2e4..660f79effd53 100644
--- a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c
+++ b/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c
@@ -837,7 +837,7 @@ TcgAddEndTransaction(
 }
 
 /**
-  Initial the tcg parse stucture.
+  Initial the tcg parse structure.
 
   @param    ParseStruct    Input parse structure.
   @param    Buffer         Input buffer data.
diff --git a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c 
b/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c
index b6d5cf9890a0..ff331bfc8ad9 100644
--- a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c
+++ b/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c
@@ -640,7 +640,7 @@ TcgSetAuthorityEnabled(
   @param     HostSession       Host session data.
   @param     AceRow            Ace row info.
   @param     Authority1        Authority 1 info.
-  @param     LogicalOperator   Logiccal operator info.
+  @param     LogicalOperator   Logical operator info.
   @param     Authority2        Authority 2 info.
 
   @retval    Return the action result.
diff --git a/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c 
b/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c
index 97e819edf4d5..f2529fb9888b 100644
--- a/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c
+++ b/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c
@@ -61,7 +61,7 @@ OnReadyToBoot (
   Typically, there are 2 mechanism for resetting eDrive. They are:
   1. TPer Reset through IEEE 1667 protocol.
   2. TPer Reset through native TCG protocol.
-  This routine will detect what protocol the attached eDrive comform to, TCG or
+  This routine will detect what protocol the attached eDrive conform to, TCG or
   IEEE 1667 protocol. Then send out TPer Reset command separately.
 
   @param[in] Ssp      The pointer to EFI_STORAGE_SECURITY_COMMAND_PROTOCOL 
instance.
@@ -109,7 +109,7 @@ InitiateTPerReset (
                   MediaId,
                   100000000,                    // Timeout 10-sec
                   0,                            // SecurityProtocol
-                  0,                            // SecurityProtocolSpecifcData
+                  0,                            // SecurityProtocolSpecificData
                   Len,                          // PayloadBufferSize,
                   Buffer,                       // PayloadBuffer
                   &XferSize
@@ -145,7 +145,7 @@ InitiateTPerReset (
                   MediaId,
                   100000000,                    // Timeout 10-sec
                   0,                            // SecurityProtocol
-                  0,                            // SecurityProtocolSpecifcData
+                  0,                            // SecurityProtocolSpecificData
                   Len,                          // PayloadBufferSize,
                   Buffer,                       // PayloadBuffer
                   &XferSize
@@ -197,7 +197,7 @@ InitiateTPerReset (
                     MediaId,
                     100000000,                    // Timeout 10-sec
                     SECURITY_PROTOCOL_TCG,        // SecurityProtocol
-                    0x0400,                       // 
SecurityProtocolSpecifcData
+                    0x0400,                       // 
SecurityProtocolSpecificData
                     512,                          // PayloadBufferSize,
                     Buffer                        // PayloadBuffer
                     );
@@ -341,7 +341,7 @@ MorDriverEntryPoint (
     //
     // Create a Ready To Boot Event and Clear the MorControl bit in the call 
back function.
     //
-    DEBUG ((DEBUG_INFO, "TcgMor: Create ReadyToBoot Event for MorControl Bit 
cleaning!\n"));
+    DEBUG ((EFI_D_INFO, "TcgMor: Create ReadyToBoot Event for MorControl Bit 
cleaning!\n"));
     Status = EfiCreateEventReadyToBootEx (
                TPL_CALLBACK,
                OnReadyToBoot,
diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c 
b/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c
index 6bec54b93217..b5b6aec98caf 100644
--- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c
+++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c
@@ -2583,7 +2583,7 @@ OpalDriverGetDriverDeviceName(
   @param ImageHandle     Image Handle this driver.
   @param SystemTable     Pointer to SystemTable.
 
-  @retval EFI_SUCCESS     This function always complete successfully.
+  @retval EFI_SUCCESS    This function always complete successfully.
 **/
 EFI_STATUS
 EFIAPI
diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c 
b/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c
index ef117d3d031e..211e75537a07 100644
--- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c
+++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c
@@ -1110,7 +1110,7 @@ OpalHiiGetBrowserData (
   Set a string Value in a form.
 
   @param      DestStringId   The stringid which need to update.
-  @param      SrcAsciiStr    The string nned to update.
+  @param      SrcAsciiStr    The string need to update.
 
   @retval  EFI_SUCCESS       Do the required action success.
   @retval  Others            Other error occur.
@@ -1164,7 +1164,7 @@ HiiSetFormString(
 
   @param Dev                  The Opal device.
 
-  @retval EFI_SUCCESS          Initialize the device success.
+  @retval EFI_SUCCESS         Initialize the device success.
   @retval EFI_DEVICE_ERROR    Get info from device failed.
 
 **/
@@ -1220,7 +1220,7 @@ OpalDiskInitialize (
 
   @param OpalDisk                The Opal device.
 
-  @retval EFI_SUCCESS             Get ownership success.
+  @retval EFI_SUCCESS            Get ownership success.
   @retval EFI_ACCESS_DENIED      Has send BlockSID command, can't change 
ownership.
   @retval EFI_INVALID_PARAMETER  Not get Msid info before get ownership info.
 
@@ -1254,7 +1254,7 @@ OpalDiskUpdateOwnerShip (
 
   @param OpalDisk                The Opal device.
 
-  @retval EFI_SUCCESS             Initialize the device success.
+  @retval EFI_SUCCESS            Initialize the device success.
   @retval EFI_DEVICE_ERROR       Get info from device failed.
   @retval EFI_INVALID_PARAMETER  Not get Msid info before get ownership info.
   @retval EFI_ACCESS_DENIED      Has send BlockSID command, can't change 
ownership.
diff --git a/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c 
b/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c
index 83c3ad50d1a2..89c1be0417ed 100644
--- a/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c
+++ b/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c
@@ -31,7 +31,7 @@ LockTpmPhysicalPresence (
   );
 
 //
-// Global defintions for lock physical presence PPI and its descriptor.
+// Global definitions for lock physical presence PPI and its descriptor.
 //
 PEI_LOCK_PHYSICAL_PRESENCE_PPI    mLockPhysicalPresencePpi = {
   LockTpmPhysicalPresence
diff --git a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c 
b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c
index e0d0a207e1bf..0f9bad724ebf 100644
--- a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c
+++ b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c
@@ -141,7 +141,7 @@ Tcg2ConfigPeimEntryPoint (
   ASSERT_EFI_ERROR (Status);
 
   //
-  // Even if no TPM is selected or detected, we still need intall 
TpmInitializationDonePpi.
+  // Even if no TPM is selected or detected, we still need install 
TpmInitializationDonePpi.
   // Because TcgPei or Tcg2Pei will not run, but we still need a way to notify 
other driver.
   // Other driver can know TPM initialization state by TpmInitializedPpi.
   //
diff --git a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c 
b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
index 3788063cc9e8..7e94a8e1ed1a 100644
--- a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
+++ b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c
@@ -1006,7 +1006,7 @@ PeimEntryMA (
     }
 
     //
-    // Only intall TpmInitializedPpi on success
+    // Only install TpmInitializedPpi on success
     //
     Status = PeiServicesInstallPpi (&mTpmInitializedPpiList);
     ASSERT_EFI_ERROR (Status);
@@ -1027,7 +1027,7 @@ PeimEntryMA (
       );
   }
   //
-  // Always intall TpmInitializationDonePpi no matter success or fail.
+  // Always install TpmInitializationDonePpi no matter success or fail.
   // Other driver can know TPM initialization state by TpmInitializedPpi.
   //
   Status2 = PeiServicesInstallPpi (&mTpmInitializationDonePpiList);
diff --git a/SecurityPkg/Tcg/TcgPei/TcgPei.c b/SecurityPkg/Tcg/TcgPei/TcgPei.c
index 284fc394f063..a9a808c9ecf3 100644
--- a/SecurityPkg/Tcg/TcgPei/TcgPei.c
+++ b/SecurityPkg/Tcg/TcgPei/TcgPei.c
@@ -146,7 +146,7 @@ EFI_PEI_NOTIFY_DESCRIPTOR           mNotifyList[] = {
 };
 
 /**
-  Record all measured Firmware Voluem Information into a Guid Hob
+  Record all measured Firmware Volume Information into a Guid Hob
   Guid Hob payload layout is
 
      UINT32 *************************** FIRMWARE_BLOB number
@@ -501,7 +501,7 @@ MeasureMainBios (
 }
 
 /**
-  Measure and record the Firmware Voluem Information once FvInfoPPI install.
+  Measure and record the Firmware Volume Information once FvInfoPPI install.
 
   @param[in] PeiServices       An indirect pointer to the EFI_PEI_SERVICES 
table published by the PEI Foundation.
   @param[in] NotifyDescriptor  Address of the notification descriptor data 
structure.
@@ -824,7 +824,7 @@ PeimEntryMA (
     }
 
     //
-    // Only intall TpmInitializedPpi on success
+    // Only install TpmInitializedPpi on success
     //
     Status = PeiServicesInstallPpi (&mTpmInitializedPpiList);
     ASSERT_EFI_ERROR (Status);
@@ -845,7 +845,7 @@ PeimEntryMA (
       );
   }
   //
-  // Always intall TpmInitializationDonePpi no matter success or fail.
+  // Always install TpmInitializationDonePpi no matter success or fail.
   // Other driver can know TPM initialization state by TpmInitializedPpi.
   //
   Status2 = PeiServicesInstallPpi (&mTpmInitializationDonePpiList);
diff --git a/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni 
b/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni
index dbb4924c0d99..d6e047d74577 100644
--- a/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni
+++ b/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni
@@ -1,5 +1,5 @@
 // /** @file
-// Provides ACPI metholds for TPM 2.0 support
+// Provides ACPI methods for TPM 2.0 support
 //
 // This driver implements TPM 2.0 definition block in ACPI table and
 // registers SMI callback functions for TCG2 physical presence and
diff --git a/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni 
b/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni
index 807163367023..a3abb3addf0c 100644
--- a/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni
+++ b/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni
@@ -1,5 +1,5 @@
 // /** @file
-// Implements ACPI metholds for the TCG feature
+// Implements ACPI methods for the TCG feature
 //
 // This driver implements TPM definition block in ACPI table and registers SMI
 // callback functions for physical presence and MemoryClear to handle the 
requests
-- 
2.21.1


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#53967): https://edk2.groups.io/g/devel/message/53967
Mute This Topic: https://groups.io/mt/71040679/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to